'Red October' Response Shows Importance Of Threat Indicators

Researchers provide indicators of compromise for Red October that helps companies check for infections

When Kaspersky Lab published the initial report identifying the Red October cyberespionage campaign early last week, many companies likely searched the publication for ways to detect the malware in their own systems.

While firms could attempt to tease out attributes that would help them identify signs of the attack, the report was not meant to offer actionable intelligence. To fill that need, Kaspersky Lab and security-management firm AlienVault followed up this week, releasing a compilation of the indicators of compromise (IOCs) (PDF) to help companies hunt down any potential infections.

IOCs -- the telltale signs that can be used by correlation programs and monitoring software to detect malicious software -- aid companies in responding to potential threats. Sharing such threat information is important, says Jaime Blasco, director of AlienVault research labs.

"The ideal scenario is that everyone and every vendor uses the same format for indicators of compromise," he says. "You can use it to share threat data, so all of us can benefit."

In creating the report, AlienVault used an open format designed to help companies exchange threat information known as OpenIOC. Created and used internally by Mandiant since 2007, the format for describing indicators of compromise was released in 2011 as OpenIOC. While reports can relay the narrative details of an attack, OpenIOC describes detailed information in a machine-readable format, says Douglas Wilson, principal consultant and threat indicators team lead for Mandiant.

"We are specifically describing artifacts, something where you could do a logical test to find out if there is an intruder on your system," Wilson says. "We are not describing threat actor groups; we are not describing campaigns. We are specifically using it to find evil on the systems that have intruders on them or previously had intruders on them."

The Red October cyberespionage network stealthily invaded the computers of governments and industry in a number of countries, mainly Eastern Europe, former states of the Soviet Union, and Asian countries. Discovered by Kaspersky Lab in October, Red October had been operating for about five years. While the espionage software appeared to be programmed by Russian developers, it used exploits common to Chinese targeted attacks to compromise systems, the firm said.

The report released by Kaspersky Lab and AlienVault includes file names and paths commonly used by Red October, as well as the domain names and IP addresses of the command-and-control and proxy servers used to manage the espionage network. The main backdoor was stored on infected systems using a wide variety of names and extensions, and in an encrypted format.

While antivirus and intrusion detection products will include ways of recognizing threats based on similar data, an open format for indicators of compromise allow companies to tailor the information to their own environment and systems, Wilson says.

"You can't open up an antivirus product to customize the signature," he says. "You can do that with an OpenIOC."

Giving companies a better way to share threat data is a laudable goal, says Gary Sockrider, solutions architect for the Americas for Arbor Networks. Information-sharing among companies in the same industry and between government agencies and the private sector has been difficult.

"Different entities and organizations -- they have different visibility into what is out there," he says. "The more that we can share this information, the more useful it can be for everyone."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Published: 2015-03-03Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

Published: 2015-03-03** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.